Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
7e9c08b8b33bb3exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
7e9c08b8b33bb3exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
7e9c08b8b33bb3exeexeexeex.exe
-
Size
48KB
-
MD5
7e9c08b8b33bb3cc65d01ba1d78388ad
-
SHA1
6c56d9b3498050faf570a17d2d7d03b35ee13e46
-
SHA256
cbd46c01d71b33690192707656f974745d4877ff6b9efb7f7cb118feb1da9397
-
SHA512
97e2425bf8cbdee44cbd4b321c4e9779c6e043cb7c5d9042eccf215719eed762d084b5f8a8e9f34a962695f031b8ddcca5772309f4df0e9c7edb29b3c7b5d21b
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4Uu6EIEIDKlEuP:bIDOw9a0DwitDwIzDKlEuP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2940 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 7e9c08b8b33bb3exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2940 2336 7e9c08b8b33bb3exeexeexeex.exe 28 PID 2336 wrote to memory of 2940 2336 7e9c08b8b33bb3exeexeexeex.exe 28 PID 2336 wrote to memory of 2940 2336 7e9c08b8b33bb3exeexeexeex.exe 28 PID 2336 wrote to memory of 2940 2336 7e9c08b8b33bb3exeexeexeex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e9c08b8b33bb3exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\7e9c08b8b33bb3exeexeexeex.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD55cd5d4d9f9e6429b53e6945dce141689
SHA1b373bc47c7edc2a707f2670ba3301e9a814e5ef6
SHA256df62e555213ee052a8bf9dd31fa66776138ab009cfb2826518085fedbcbd9656
SHA512d48f6d6896b59f1748d3e0b7daafb38596cd37ff4d086f1d9c3ffd0fb57a455eb0669362c540c9a7f5b7dfdb82ca768106e5c0cf2b33d00ceb7064627c24660f
-
Filesize
48KB
MD55cd5d4d9f9e6429b53e6945dce141689
SHA1b373bc47c7edc2a707f2670ba3301e9a814e5ef6
SHA256df62e555213ee052a8bf9dd31fa66776138ab009cfb2826518085fedbcbd9656
SHA512d48f6d6896b59f1748d3e0b7daafb38596cd37ff4d086f1d9c3ffd0fb57a455eb0669362c540c9a7f5b7dfdb82ca768106e5c0cf2b33d00ceb7064627c24660f
-
Filesize
48KB
MD55cd5d4d9f9e6429b53e6945dce141689
SHA1b373bc47c7edc2a707f2670ba3301e9a814e5ef6
SHA256df62e555213ee052a8bf9dd31fa66776138ab009cfb2826518085fedbcbd9656
SHA512d48f6d6896b59f1748d3e0b7daafb38596cd37ff4d086f1d9c3ffd0fb57a455eb0669362c540c9a7f5b7dfdb82ca768106e5c0cf2b33d00ceb7064627c24660f